summaryrefslogtreecommitdiff
path: root/testing/resources/bug_602650.pdf
diff options
context:
space:
mode:
authorweili <weili@chromium.org>2016-04-22 15:25:14 -0700
committerCommit bot <commit-bot@chromium.org>2016-04-22 15:25:14 -0700
commit90c964fb069bfa9934493481f8ccfefef9c3b3fe (patch)
treec9e3d6ec93f68eb9c241411ec59132761d37d230 /testing/resources/bug_602650.pdf
parent16a2033b3b7e2e348509c9938d77268e85e2b763 (diff)
downloadpdfium-90c964fb069bfa9934493481f8ccfefef9c3b3fe.tar.xz
Add a simple check for V4 cross reference table
Some unknown software generates cross reference table with the claimed object numbers are all off by one. Add a simple verification function to detect this scenario, thus have a chance to rebuild the correct cross reference table. To avoid unnecessary checks and potiential performance hit, we only check for the very first non free entry. BUG=602650 Review URL: https://codereview.chromium.org/1910063004
Diffstat (limited to 'testing/resources/bug_602650.pdf')
-rw-r--r--testing/resources/bug_602650.pdf105
1 files changed, 105 insertions, 0 deletions
diff --git a/testing/resources/bug_602650.pdf b/testing/resources/bug_602650.pdf
new file mode 100644
index 0000000000..fc915f3e80
--- /dev/null
+++ b/testing/resources/bug_602650.pdf
@@ -0,0 +1,105 @@
+%PDF-1.3
+% ò¤ô
+1 0 obj <<
+ /Type /Font
+ /Subtype /Type1
+ /BaseFont /Times-Roman
+>>
+endobj
+2 0 obj <<
+ /Type /Font
+ /Subtype /Type1
+ /BaseFont /Helvetica
+>>
+endobj
+3 0 obj <<
+>>
+stream
+BT
+20 50 Td
+/F1 12 Tf
+(Hello, world!) Tj
+0 50 Td
+/F2 16 Tf
+(Goodbye, world!) Tj
+ET
+endstream
+endobj
+4 0 obj <<
+ /Type /Catalog
+ /Pages 5 0 R
+>>
+5 0 obj <<
+ /Type /Pages
+ /MediaBox [ 0 0 200 200 ]
+ /Count 1
+ /Kids [ 6 0 R ]
+>>
+endobj
+6 0 obj <<
+ /Type /Page
+ /Parent 5 0 R
+ /Resources <<
+ /Font <<
+ /F1 1 0 R
+ /F2 2 0 R
+ >>
+ >>
+ /Contents 3 0 R
+>>
+endobj
+xref
+1 7
+0000000000 65535 f
+0000000015 00000 n
+0000000093 00000 n
+0000000169 00000 n
+0000000290 00000 n
+0000000336 00000 n
+0000000429 00000 n
+trailer <<
+ /Size 7
+ /Root 4 0 R
+>>
+startxref
+571
+%%EOF
+4 0 obj <<
+ /Type /Catalog
+ /Pages 5 0 R
+>>
+endobj
+5 0 obj <<
+ /Type /Pages
+ /MediaBox [ 1 1 250 250 ]
+ /Count 1
+ /Kids [ 6 0 R ]
+>>
+endobj
+6 0 obj <<
+ /Type /Page
+ /Parent 5 0 R
+ /Resources <<
+ /Font <<
+ /F1 1 0 R
+ /F2 2 0 R
+ >>
+ >>
+ /Contents 3 0 R
+>>
+endobj
+xref
+0 1
+0000000000 65535 f
+4 3
+0000000778 00000 n
+0000000831 00000 n
+0000000924 00000 n
+trailer <<
+ /Size 7
+ /Root 4 0 R
+ /Prev 571
+>>
+startxref
+1066
+%%EOF